scholarly journals Proses Migrasi Cloud Computing Dari Lingkungan Amazon Ec2 Ke Vmware

2019 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Jauharul Mafakhiri

Intisari— Permasalahan pada penelitian ini adalah mengenai pengujian virtual machine di tingkat fungsionalitas aplikasi pada lingkungan komputasi awan di antara dua cloud provider IaaS (Infrastructure as a Service). Tujuan dari pengujian fungsionalitas ini adalah untuk mengetahui tingkat interoperabilitas aplikasi dalam sistem virtual machine yang berpindah dari sebuah cloud provider ke cloud provider lain, yaitu migrasi dari Amazon EC2 ke VMWARE. Peneliti memiliki ketertarikan mengenai pengujian migrasi ini sebab perkembangan Internet menjadi semakin pesat, dan diiringi dengan meningkatnya jumlah aplikasi yang memanfaatkan teknologi komputasi awan itu, sementara kemampuan proses bisnis suatu aplikasi semakin bertambah, fitur layanan yang ditawarkan para pihak cloud provider menjadi semakin baik (dari sisi harga menjadi lebih murah, performansi sistem menjadi lebih tinggi, sistem menjadi lebih handal, pemanfaatan kecanggihan teknologi security terbaru, maupun Service Level Agreement (SLA) menjadi lebih baik), maka memungkinkan untuk berpindah layanan ke cloud provider lain, namun di sisi praktik sering terjadi kegagalan fungsionalitas aplikasi dalam proses migrasi ke sistem cloud yang lain, yang antara lain disebabkan oleh masalah ketergantungan terhadap penyedia layanan komputasi awan (vendor lock-in). Masalah ketergantungan ini muncul disebabkan oleh jumlah cloud provider semakin bertanbah banyak dan mempunyai standar tersendiri dalam pembangunan sistemnya, sehingga dapat mengakibatkan kemampuan migrasi antar cloud itu dapat memiliki keterbatasan untuk hal-hal tertentu. Dengan 28 test case pengujian atas fitur-fitur pada aplikasi website ujian online yang diuji pada penelitian ini, diperoleh hasil tingkat interoperabilitas migrasi dari Amazon EC2 ke VMWARE memiliki nilai sebesar 46.43%. Kata kunci— pengujian, fungsionalitas, komputasi, awan, migrasi, interoperabilitas.

Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


2019 ◽  
Vol 8 (3) ◽  
pp. 1457-1462

Cloud computing technology has gained the attention of researchers in recent years. Almost every application is using cloud computing in one way or another. Virtualization allows running many virtual machines on a single physical computer by sharing its resources. Users can store their data on datacenter and run their applications from anywhere using the internet and pay as per service level agreement documents accordingly. It leads to an increase in demand for cloud services and may decrease the quality of service. This paper presents a priority-based selection of virtual machines by cloud service provider. The virtual machines in the cloud datacenter are configured as Amazon EC2 and algorithm is simulated in cloud-sim simulator. The results justify that proposed priority-based virtual machine algorithm shortens the makespan, by 11.43 % and 5.81 %, average waiting time by 28.80 % and 24.50%, and cost of using the virtual machine by 21.24% and 11.54% as compared to FCFS and ACO respectively, hence improving quality of service.


Author(s):  
Gaurav Sharma ◽  
Urvashi Garg, A.P ◽  
Arun Jain, A.P ◽  
Loveleena Mukhija, A.P

Cloud computing is the combination of distributed computing, grid computing and parallel technologies which define the shape of a new era. In this technology client data is stored and maintain in the data center of a cloud provider like Google, Amazon and Microsoft etc. It has inherited the legacy technology and including unique ideas. Industries, such as education, banking and healthcare are moving towards the cloud due to the efficiency of services such as transactions carried out, processing power used, bandwidth consumed, data transferred etc. There are various challenges  for adopting cloud computing such as privacy ,interoperability, managed service level agreement (SLA) and reliability. In this paper we survey challenges in resources allocation and the security issues of the cloud environment.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 223
Author(s):  
A Banushri ◽  
R A. Karthika

To enjoy the full benefits of cloud computing, it is necessary to have built-in security, privacy, compliance and legal requirements for the cloud implementation and use. Each industry has its own risk levels that it could work within. A company, which is planning to use public cloud services, should be conscious of the regulations and industry risks and need to monitor it and abide by the same. This is due to multi-tenant and open to all nature of public cloud. A thorough risk analysis must be done initially with a public cloud provider. The main objective is to identify the existing vulnerabilities and to implement the measures to counter those threats. There are a variety of risks such as vendor lock-in, non-compliance, poor provisioning, unauthorized access, loss of control, Service Level Agreement (SLA) violations, Internet attacks, etc. To alleviate the risks, there are several measures that could be deployed. This paper deals with mitigation mechanism, security requirements and various risks associated with public cloud.  


2020 ◽  
Vol 17 (1) ◽  
pp. 526-530
Author(s):  
H. M. Anitha ◽  
P. Jayarekha

Cloud computing is an emerging technology that offers the services to all the users as per their demand. Services are leveraged according to the Service level agreement (SLA). Service level agreement is monitored so that services are offered to the users without any problem and deprival. Software Defined Network (SDN) is used in order to monitor the trust score of the deployed Virtual Machines (VM) and Quality of Service (QoS) parameters offered. Software Defined Network controller is used to compute the trust score of the Virtual Machines and find whether Virtual Machine is malicious or trusted. Genetic algorithm is used to find the trusted Virtual Machine and release the resources allocated to the malicious Virtual Machine. This monitored information is intimated to cloud provider for further action. Security is enhanced by avoiding attacks from the malicious Virtual Machine in the cloud environment. The main objective of the paper is to enhance the security in the system using Software Defined Network based secured model.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


Sign in / Sign up

Export Citation Format

Share Document